Jump to content

1972vet

Experts
  • Posts

    1,357
  • Joined

  • Last visited

Everything posted by 1972vet

  1. Thanks Maurice for taking the time. The files are still present for whatever reason, but not causing any harm. Enough of your time has been spent chasing this ghost, but I do appreciate the time and attention. Good to know you're still working. As you might be able to tell from my profile, I haven't been active on these forums for about nine years now. My last big hurrah was the final five years I spent on the help sites as Microsoft MVP along with you and all the others. It was good, those years ago but time has been more precious and less available for me. Thanks again, and many good wishes for your future endeavors! vet
  2. Yes, MS Defender is the only antivirus. MBAM is my more reliable defense so I didn't (haven't for years) install anything else. Microsoft Edge version for me is: Version 117.0.2045.31 (Official build) (64-bit) K, here we go: FSS.zip
  3. Fixlog.zip Nice ride, do your stuff Maurice!
  4. smacked my forehead, here ya go SecurityCheck.zip
  5. Here we go Maurice! FRST.zipAddition.zip
  6. again, no joy, I'm baffled. I have several entries similar to these: + FullyQualifiedErrorId : RemoveFileSystemItemArgumentError,Microsoft.PowerShell.Commands.RemoveItemCommand Remove-Item : Cannot remove item C:\Windows\System32\DriverStore\Temp\DEL66F7.tmp: Access to the path is denied. At line:3 char:25 ...and now I found I have another one. These files obviously are being generated by some active process but I am hard pressed to find out what it is.
  7. Thanks for the responses. Yes I've tried safe mode. Done all you suggested Maurice (btw, how've you been all these years?), scanned again with revo, junk files sill there.
  8. Need assistance in removing temp files in driver/store that have my curiosity piqued (see details below). I found these files when I ran a scan with Revo for junk files. These files showed up dated Sept. 8 in the early morning hours. Recently, I discovered a hack of my google account. When I investigated, I discovered three phone accounts with names I didn't recognize nor did I own, or have I ever owned, so I removed them from my google account, used a "send erase" request and changed my password. Hopefully now, they wont return. Two of those sign in dates for the intruders correspond nicely with the date of those errant temp driver store files. The other one signed in back in June, followed several months by the others. I've scanned of course with mbam and as usual, nothing found. Now, I cant say with certainty that these files resulted from anything nefarious, but I've not run across any temp driver files before that I couldn't remove. I suspect these files are left over from some uninstalled game driver probably related to bluestacks, although I haven't been able to nail that down. Only other coincidence is the google hack. My laptop is a Dell inspiron 15 running windows 11. I've only had it for these past several months. Anyone with suggestions is appreciated. Thanks! vet Details: Driver/Store temp files: C:\Windows|System32\DriverStore\Temp\DEL66F7.tmp C:\Windows|System32\DriverStore\Temp\DEL6727.tmp C:\Windows|System32\DriverStore\Temp\DEL6738.tmp C:\Windows|System32\DriverStore\Temp\DEL6748.tmp Intruders: Galaxy S21 Ultra 5G Crystal City, MO, USA Last activity: Yesterday, 5:10 AM Signed out First sign-in: Sep 7 Galaxy S22 Crystal City, MO, USA Last activity: September 7, 6:27 AM Signed out First sign-in: Sep 6 This session was used only briefly, and not recently. It’s already ended and has no access to your account. OnePlus5 Crystal City, MO, USA Last activity: September 5, 5:03 AM Signed out First sign-in: Jun 12 ...by the way, Crystal City is a neighboring town. I live just about three miles from there.
  9. I had the same 51 found during scan moments ago...chose not to quarantine as in all the years I've used mbam it's never found a thing on my system. Any idea when this will be changed out so future detection of these will be avoided? ...waiting for advancedsetup or one of the crew
  10. Strange indeed. V2 products are sold in stores across the country and online. I've used them for years. If the WOT browser extension can't be trusted, then how can one learn to trust the evaluations from it. It's a real conundrum.
  11. MB just asked today if I wanted to upgrade. Immediately upon upgrading I went to visit a website where I always go to purchase my ecigs supplies. MB popped up the message that the website is a "Fraud". Can someone look into this and let me know if I've been dupped? Thanks (alleged fraud website would be dubdubdub..v2.com)
  12. Unlocked at the request of the member, as this issue has once again re-appeared. Please carry on.
  13. At the request of the member, this topic is re-opened for further research...please carry on.
  14. Success! You could, if you like, scan again and enable "Rootkit" scanning. To do that, open mbam, click "Detection and Protection" and check the box "Scan for rootkits". How's it running for you?
  15. There are more than a few problems, but before we proceed you should look for and uninstall the following program: QuickShare QuickShare is an adware program most commonly bundled with other "Free" downloaded software of certain type(s). This particular piece of vermin has almost rootkit type capabilities (...almost, although not quite). You should use caution when downloading/installing programs from the internet and uncheck certain items (when available as an option) so that other "PUP" type software won't be surreptitiously installed. Next, you need to decide upon, which of these you would prefer to keep and which to uninstall: AVG AntiVirus Free Edition 2014 Symantec AntiVirus Corporate Edition ...having both of those programs installed and running real time protection will cause instability and eventually a system crash with the potential of data loss of course. These two programs alone, running while you try to scan with mbam would in fact, cause such a struggle among them that the system would freeze up just as you have described. You really have no need of this program either: Spybot - Search & Destroy Once you have completed all of the above, please reboot the system and try running a threat scan with mbam. Post back the resulting log. Thanks!
  16. Greetings Mr. Bojangles and thank you for your patience, Please disable the active protection component of your antivirus and antispyware programs by following the directions that apply Here. Next, please download the free utility DDS from any of these locations...Here, Here...or Here. Note - Some infections may prevent certain executable files from running on your computer. If one of these download locations results in a failed run of the utility, please try the next location until you find one that will work on your machine Double click the downloaded dds utility to run the tool When it completes, DDS will open two (2) logs:DDS.txtAttach.txtSave both reports to your desktop. Please remember to include the following logs in your next reply, Thanks! DDS.txt Attach.txt
  17. Per the request from the user, this thread is closed and the member will re-post once all the peer to peer software has been removed.
  18. Re-opened as per request of member, please carry on.
  19. Re-opened at users request...user wanted to thank kevinf80 for the help, and wants the opportunity to finish up.Good work Kev! Please carry on...
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.